Contact Us

Continuity Insights Management Conference

Risk Levels Are Increasing, Response Time Lagging for Mitigating Emerging Threats

New research from ISACA, CMMI Institute, and Infosecurity looks at the types of risk that organizations are experiencing, their risk management maturity levels, the most critical categories of risk, and how quickly organizations are able to respond to emerging threats.

More than half of risk professionals worldwide say their organization’s risk levels have increased in the past 12 months, according to new research from ISACA, CMMI Institute and Infosecurity Group.

The State of Enterprise Risk Management 2020 report reveals that only 29 percent of respondents have a high degree of confidence that their enterprise can accurately predict the impact of threats and vulnerabilities associated with emerging technologies. Additionally, fewer than a third (31 percent) of security pros say their enterprises can respond quickly when new threats are identified, a problematic dynamic given today’s fast pace of business and technology-driven change.

State of ERM 2020 found that the most critical categories of risk facing enterprises today are:

  1. Cybersecurity (29 percent)
  2. Reputation (15 percent)
  3. Financial (13 percent)

The top five cybersecurity risk management challenges are changes/advances in technology, changes in types of threats, too few security personnel, missing skills in existing cybersecurity personnel, and increased number and frequency of threats.

Risk Identification Processes Commonly Adopted, But Infrequently Optimized
The study also found that nearly two-thirds of respondents have defined processes for risk identification, but only 38 percent believe that those processes are at either the managed or optimized level of the maturity spectrum. This high adoption, low optimization trend shows there is significant need for action and improvement.

Global Regions Face Wide Spectrum of Cybersecurity Threats
The State of Enterprise Risk Management 2020 study also reports diversity in the types of attacks seen across geographic locations and industry sectors. For example, respondents from Asia and India report more nation-state attacks than those in North America, Oceania and Europe.

When it comes to managing the fallout of an issue, only 43 percent of respondents’ enterprises employ insurance as a mitigation control. Organizations in North America and Africa are the highest adopters of insurance, with Latin America being the lowest.

Management and Governance Gap Revealed
The study reveals a potential disconnect between management and governance of enterprises when it comes to risk. Respondents note that, on average, boards of directors are only updated on cybersecurity risk on a quarterly basis – sometimes even less. Chief information security officers (CISOs) are updated much more frequently, with 70 percent saying they receive updates at least once a month. This knowledge gap is a key opportunity for CISOs to expand their visibility at the governance level.

“Big risks can be ignored when the right people aren’t in the room for the conversation,” said Tracey Dedrick, ISACA board director. “Start at the highest level within the organization and get the people in the room that own the risk from the top down. This will ensure the right themes are addressed and important organizational alignment takes place.”

Five Steps for Mitigating and Addressing Risk
According to ISACA, enterprises can work to mitigate and address their risks by taking the following five steps:

  1. Use current trends and technology to predict future outcomes.
    “The trajectory of cloud—both its adoption dynamics and the risk it introduces—can serve as a bellwether for future technologies,” said ISACA Board Chair Brennan P. Baybeck. “While cloud was initially seen as creating new risks and challenges to be solved, it also delivers incredible value. Strong governance and risk management helps ensure that the value exceeds the risk—and the same is true for newly emerging technologies.”
  2. Clearly define risk. For enterprises that struggle with their risk management maturity, it is particularly important to refine and clearly define risk tolerances in order to advance along the maturity spectrum.
  3. Know your business. Remember that no two companies face the same level of risk. For example, operational risk is significantly more difficult to forecast within manufacturing compared to other industries. Cybersecurity and technology risk, by contrast, are hardest (by a wide margin) to forecast for the financial services sector.
  4. Don’t get siloed. Your stakeholders will have varying priorities when it comes to risk. That means taking a balanced approach to ensuring that multiple perspectives are acknowledged and addressed in your risk mitigation planning.
  5. Set expectations and optimize risk. Clear and direct expectations about risk tolerance – along with corresponding guidance for risk decision-makers – can go a long way to helping optimize risk for the enterprise over the long term.

ISACA CEO David Samuelson will discuss survey findings at the Infosecurity ISACA North America Expo and Conference taking place 20-21 November 2019 in New York City. For information or to register, visit https://www.infosecuritynorthamerica.com/2019/.

To download the free survey report and related resources, visit www.isaca.org/state-of-risk.

Continuity Insights

Similar Articles

Participate in the 2020 Event Impact Management Study

BC Management has announced that it is currently conducting its 9th Edition Event Impact Management 2020 study in partnership with Witt O’Brien’s. The annual study quantifies the various types of economic …

Conference Keynote: Workforce Resilience in the Wake of the Great Resignation

Leading off the 2022 Continuity Insights Management Conference, Dr. Steven B. Goldman, MIT, along with a panel of resilience thought leaders, will discuss Workforce Resilience in the Wake of the …

Active Shooter Resources Available from DHS

The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency is asking for help in sharing valuable resources on prevention and response to various active shooter scenarios to help protect …

Leave a Comment

Share to...